




已阅读5页,还剩4页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
The Internet knowledge (iKnow) measureOriginal Research ArticleComputers in Human BehaviorLabVIEW programming encourages and stimulates learner to focus on automation topics Hands-on programming ensures learner has clear understanding of automation and control LabVIEW programming encourages learner tDespite increasing development and administration of Internet surveys, tests, and many other applications to be used by employees and the general public, little is known about the knowledge individuals bring to Internet tasks. This research improves our understanding of the concept of Internet knowledge, and provides initial support for the construct validity of a new measure of Internet knowledge with respect to its factor structure, internal consistency reliability, and concurrent validity. From a practical perspective, clearer definition of Internet knowledge and the availability of a reliable measure of such knowledge can advance our understanding of how individuals develop Internet experience through its use and may also inform the process by which web sites and Internet applications are designed.Article Outline1. Internet knowledge as a construct2. Construct validation of an Internet knowledge measure 2.1. Frequency of use2.2. E-mail and information search2.3. Internet self-efficacy beliefs2.4. Computer experience3. Individual difference variables 3.1. Gender3.2. Age4. Method 4.1. Study design and participants4.2. Measures 4.2.1. Internet knowledge measure development4.2.2. Internet knowledge items4.2.3. Information search internet use items4.2.4. E-mail internet use items4.2.5. Other measures administered5. Results 5.1. Factor structure5.2. Internal consistency reliability5.3. Concurrent validity5.4. Individual differences variables6. Discussion and conclusionAppendix A. Internet use items administeredInformation search internet use items:E-mail internet use items:ReferencesA model-based aspect-oriented framework for building intrusion-aware software systemsOriginal Research ArticleInformation and Software TechnologyAn important challenge in the introductory communication networks course in electrical and computer engineering curricula is to integrate emerging topics, such as wireless Internet access and network security, into the already content-intensive course. At the same time it is essential to provide students with experiences in online collaboration, which is common in the engineering workplace, and to allow both on-campus and distance learning students to actively and jointly participate in class activities in hybrid on-campus/distance education course offerings. To address these challenges in the introductory communication networks course at Arizona State University, the authors have developed an online team design project in which students collaborate via a team website on a design project related to an emerging communication networks topic. The online team design project was evaluated with a thematic analysis of the interactions on the team websites, topic-specific pre- and posttests, and an attitudinal student survey. It was found that the online team communication was to a large extent devoted to managing the team and the project and that the students had overall very positive attitudes toward the project. Both students with lower and higher levels of prior project-related knowledge achieved approximately the same learning gain in terms of increased scores from pretest to posttest in the project.Article Outline1. Introduction2. Background and related work3. Team design project structure and procedures 3.1. Materials3.2. Team page on class website3.3. Team formation3.4. Procedure4. Evaluation 4.1. Pretest performance and blocking into lower and higher level of prior knowledge4.2. Coding of online interactions into themes4.3. Frequency and type of online communication4.4. Learning gain4.5. Attitudinal survey5. ConclusionAcknowledgementsAppendix A. Sample of project assignmentReferencesEnvironmentally conscious manufacturing and product recovery (ECMPRO): A review of the state of the artReview ArticleJournal of Environmental ManagementIncorporating ideas from computer-supported cooperative workReview ArticleJournal of Biomedical InformaticsMany information systems have failed when deployed into complex health-care settings. We believe that one cause of these failures is the difficulty in systematically accounting for the collaborative and exception-filled nature of medical work. In this methodological review paper, we highlight research from the field of computer-supported cooperative work (CSCW) that could help biomedical informaticists recognize and design around the kinds of challenges that lead to unanticipated breakdowns and eventual abandonment of their systems. The field of CSCW studies how people collaborate with each other and the role that technology plays in this collaboration for a wide variety of organizational settings. Thus, biomedical informaticists could benefit from the lessons learned by CSCW researchers. In this paper, we provide a focused review of CSCW methods and ideaswe review aspects of the field that could be applied to improve the design and deployment of medical information systems. To make our discussion concrete, we use electronic medical record systems as an example medical information system, and present three specific principles from CSCW: accounting for incentive structures, understanding workflow, and incorporating awareness.Article Outline1. Medical software systems2. CSCW: A blending of social and technical perspectives 2.1. CSCW and levels of analysis2.2. CSCW Methodology3. Reconsidering the EMR from CSCW perspectives 3.1. Incentive structures3.2. Workflow3.3. Awareness4. ConclusionReferencesHealthcare teams over the Internet: programming a certificate-based approachOriginal Research ArticleInternational Journal of Medical InformaticsSecurity is a critical issue for software systems, especially for those systems which are connected to networks and the Internet, since most of them suffer from various malicious attacks. Intrusion detection is an approach to protect software against such attacks. However, security vulnerabilities that are exploited by intruders cut across multiple modules in software systems and are difficult to address and monitor. These kinds of concerns, called cross-cutting concerns, can be handled by aspect-oriented software development (AOSD) for better modularization. A number of works have utilized AOSD to address security issues of software systems, but none of them has employed AOSD for intrusion detection. In this paper, we propose a model-based aspect-oriented framework for building intrusion-aware software systems. We model attack scenarios and intrusion detection aspects using an aspect-oriented Unified Modeling Language (UML) profile. Based on the UML model, the intrusion detection aspects are implemented and woven into the target system. The resulting target system has the ability to detect the intrusions automatically. We present an experimental evaluation by applying this framework for some of the most common attacks included in the Web Application Security Consortium (WASC) web security threat classification. The experimental results demonstrate that the framework is effective in specifying and implementing intrusion detection and can be applied for a wide range of attacks.Article Outline1. Introduction2. The framework 2.1. Framework overview2.2. Identifying vulnerabilities and attacks2.3. Modeling attack scenarios using UML 2.3.1. The UML profile2.3.2. Aspect-oriented attack scenario model 2.3.2.1. Class diagrams2.3.2.2. State machine diagram2.3.2.3. Sequence diagram2.4. Transforming the attack scenario model to IDAs 2.4.1. Aspect code generator2.4.2. Aspect code for SQL injection attack 2.4.2.1. The generated aspect code2.4.2.2. The attack signature code2.4.2.3. The attack prevention code2.5. Weaving the IDAs into the target system2.6. Deploying the intrusion-aware system 2.6.1. Intrusion-aware software system architecture2.6.2. Detection algorithm2.6.3. Detecting SQL injection3. Experimental evaluation 3.1. Brute force3.2. Insufficient authentication attack3.3. Session Hijack3.4. Denial of service (DoS)3.5. Cross-site scripting (XSS)3.6. Buffer overflow3.7. Directory indexing3.8. Path traversal4. Related work 4.1. AOSD for security4.2. UML profile for AOSD4.3. UML profile for security5. Conclusions and future workAcknowledgementsReferencesEnvironmentally conscious manufacturing and product recovery (ECMPRO): A review of the state of the artReview ArticleJournal of Environmental ManagementCollaborative conceptual designstate of the art and future trendsComputer-Aided DesignLearn to use and use to learn: Technology in virtual collaboration experienceOriginal Research ArticleThe Internet and Higher EducationInternet and the
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025贵州毕节市融资担保集团有限公司及下属子公司面向社会招聘12名工作人员拟聘用人员笔试参考题库附带答案详解
- 2025福建厦门国贸集团股份有限公司校园招聘27人笔试参考题库附带答案详解
- 2025河南驻马店市正阳县县管国有企业招聘21人笔试参考题库附带答案详解
- 2025江西南昌民航空管实业有限责任公司面向社会招收劳务派遣制员工汽车驾驶员笔试参考题库附带答案详解
- 2025年陕西医药控股集团有限责任公司招聘28人笔试参考题库附带答案详解
- 2025年福建省储备粮管理有限公司直属库工作人员招聘33人笔试参考题库附带答案详解
- 2025年浙江平阳县城市发展集团有限公司下属房开公司公开招聘7人笔试参考题库附带答案详解
- 2025年度山西地质集团校园招聘307人笔试参考题库附带答案详解
- 2025年中铁集装箱运输有限责任公司招聘(19人)笔试参考题库附带答案详解
- 2025年中国建筑地勘中心陕西总队招聘13人笔试参考题库附带答案详解
- 人工智能在国际贸易中的应用
- 视频监控调取记录表
- 第2章 Windows 10操作系统
- 教研活动:幼儿园班级主题墙创设课件
- GB/T 42430-2023血液、尿液中乙醇、甲醇、正丙醇、丙酮、异丙醇和正丁醇检验
- 酒店住宿水单模板-可修改
- SF-三福的历史与文化 v2.0
- 幼儿园故事《小红帽》PPT模板
- GB/T 6723-2017通用冷弯开口型钢
- GB/T 4456-2008包装用聚乙烯吹塑薄膜
- 葫芦丝(初学教学)-课件
评论
0/150
提交评论